Jump to ratings and reviews
Rate this book

Metasploit Bootcamp

Rate this book
Following on from the previous chapter, will focus on exploiting various types of service and client-side exploitation while this will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems.Book chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The chapters prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, book brings in sophisticated attack vectors and challenges based on the user's preparation over the past six days and ends with a Metasploit challenge to solve.

214 pages, Paperback

Published July 27, 2017

1 person want to read

About the author

Charles Fountain

18 books2 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.